Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/11/2024, 21:20

General

  • Target

    41314a952c25167f369f58639829296c3a2976325b7187ac06c8be4902610d55.xlsm

  • Size

    20KB

  • MD5

    23218a235b0feb7477598fb1e730b46f

  • SHA1

    26d9dcf5ba8c5c743f2aff0eddff8a4294d02439

  • SHA256

    41314a952c25167f369f58639829296c3a2976325b7187ac06c8be4902610d55

  • SHA512

    859cdf08cf8cf2abd8efa8c6c8cd96cafd08e4f74fc73ce089d1dafc5cbdf1be707d85dd9bdbad1dc4b63f02b0d0177be7066d19e88ff666b64c07f52ec961d2

  • SSDEEP

    384:GKAVb1GNjYTo4CGzPd6ZIwL0AOKb5CzgObff9kC+xbX7jvIv:GKYINmo4FLyCBn9kC+xbLA

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://www.manchesterslt.co.uk/a-to-z-of-slt/9wq2ESVcG/

xlm40.dropper

http://festival.artdialog.ch/contact/RGhcwH4DRBM/

xlm40.dropper

http://bramynapilota.com.pl/wp-admin/NHk/

xlm40.dropper

http://brwconsultoria.com.br/img/Vl0i9o/

xlm40.dropper

http://buildershyper.co.za/s6Oe/

xlm40.dropper

http://business-tailor.nl/ww12/Kz7GjU/

xlm40.dropper

https://eephysiotherapy.co.uk/blog/mn1d1JScv1CIg4aTy/

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\41314a952c25167f369f58639829296c3a2976325b7187ac06c8be4902610d55.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:3488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    2KB

    MD5

    a4f29e0ad039cc904bc0b13c4c34504b

    SHA1

    904fe806853e229368f165cd18502c01f30add04

    SHA256

    cc763d469f52b92cb5ffbbdcad409a831b869aed24115d023d528af0903c8132

    SHA512

    c1bccb09388e27151460a5538d8a0a917fd78d5cc90197692a32c0f90236f3eca4ff87b86e7b5a9c5cdb637af9a01213897bb01b8bd4784b104ad478f99d5ff0

  • memory/3488-6-0x00007FFC36990000-0x00007FFC36B85000-memory.dmp

    Filesize

    2.0MB

  • memory/3488-13-0x00007FFC36990000-0x00007FFC36B85000-memory.dmp

    Filesize

    2.0MB

  • memory/3488-4-0x00007FFBF6A10000-0x00007FFBF6A20000-memory.dmp

    Filesize

    64KB

  • memory/3488-1-0x00007FFC36A2D000-0x00007FFC36A2E000-memory.dmp

    Filesize

    4KB

  • memory/3488-3-0x00007FFBF6A10000-0x00007FFBF6A20000-memory.dmp

    Filesize

    64KB

  • memory/3488-8-0x00007FFC36990000-0x00007FFC36B85000-memory.dmp

    Filesize

    2.0MB

  • memory/3488-10-0x00007FFC36990000-0x00007FFC36B85000-memory.dmp

    Filesize

    2.0MB

  • memory/3488-7-0x00007FFC36990000-0x00007FFC36B85000-memory.dmp

    Filesize

    2.0MB

  • memory/3488-11-0x00007FFBF40B0000-0x00007FFBF40C0000-memory.dmp

    Filesize

    64KB

  • memory/3488-16-0x00007FFC36990000-0x00007FFC36B85000-memory.dmp

    Filesize

    2.0MB

  • memory/3488-9-0x00007FFC36990000-0x00007FFC36B85000-memory.dmp

    Filesize

    2.0MB

  • memory/3488-14-0x00007FFBF40B0000-0x00007FFBF40C0000-memory.dmp

    Filesize

    64KB

  • memory/3488-2-0x00007FFBF6A10000-0x00007FFBF6A20000-memory.dmp

    Filesize

    64KB

  • memory/3488-17-0x00007FFC36990000-0x00007FFC36B85000-memory.dmp

    Filesize

    2.0MB

  • memory/3488-15-0x00007FFC36990000-0x00007FFC36B85000-memory.dmp

    Filesize

    2.0MB

  • memory/3488-12-0x00007FFC36990000-0x00007FFC36B85000-memory.dmp

    Filesize

    2.0MB

  • memory/3488-0-0x00007FFBF6A10000-0x00007FFBF6A20000-memory.dmp

    Filesize

    64KB

  • memory/3488-44-0x00007FFC36990000-0x00007FFC36B85000-memory.dmp

    Filesize

    2.0MB

  • memory/3488-45-0x00007FFC36A2D000-0x00007FFC36A2E000-memory.dmp

    Filesize

    4KB

  • memory/3488-46-0x00007FFC36990000-0x00007FFC36B85000-memory.dmp

    Filesize

    2.0MB

  • memory/3488-47-0x00007FFC36990000-0x00007FFC36B85000-memory.dmp

    Filesize

    2.0MB

  • memory/3488-5-0x00007FFBF6A10000-0x00007FFBF6A20000-memory.dmp

    Filesize

    64KB